2021 IEEE Conference on Dependable and Secure Computing (DSC) 2021
DOI: 10.1109/dsc49826.2021.9346230
|View full text |Cite
|
Sign up to set email alerts
|

Secure Outsourced Private Set Intersection with Linear Complexity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Under the condition of protecting the privacy of the sets of parties, the common method used to measure the spatiotemporal matching level of the two parties is PSI-CA, a variant of PSI [14]. Te PSI-CA protocol allows a party to obtain the cardinality of the intersection of the private sets with another party without revealing information other than the intersection cardinality [15].…”
Section: Related Workmentioning
confidence: 99%
“…Under the condition of protecting the privacy of the sets of parties, the common method used to measure the spatiotemporal matching level of the two parties is PSI-CA, a variant of PSI [14]. Te PSI-CA protocol allows a party to obtain the cardinality of the intersection of the private sets with another party without revealing information other than the intersection cardinality [15].…”
Section: Related Workmentioning
confidence: 99%
“…PSI has wide applications such as social discovery [1][2][3], document-like detection [4], joint learning in neural network models [5], suspect detection [6], privacy-preserving data mining [7], privacy-preserving retrieval systems [8], cloud-based applications [9], and so on. Many high-performance PSI protocols have been proposed recently [10][11][12][13][14][15][16]. Additionally, there are some PSI protocols [10,[17][18][19][20][21] specifically designed for unbalanced scenarios, where the server has a large dataset and the client has a dataset much smaller than the server's size.…”
Section: Introductionmentioning
confidence: 99%
“…So it has become an important research object to solve the problem of edge-assisted Internet of ings data privacy sharing. PSI protocol [6] refers to the intersection of two participants calculating their private sets. In the edge computing environment, two clients encrypt their respective data sets and outsource them to the edge server.…”
Section: Introductionmentioning
confidence: 99%